Description


A weakness has been identified in WebAssembly wabt up to 1.0.39. This vulnerability affects the function wabt::AST::InsertNode of the file /src/repro/wabt/bin/wasm-decompile of the component wasm-decompile. This manipulation causes memory corruption. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. Unfortunately, the project has no active maintainer at the moment. In a reply to the issue report somebody recommended to the researcher to provide a PR himself.

Related CPE's


References


https://github.com/WebAssembly/wabt/issues/2679

ExploitIssue TrackingVendor Advisory


https://vuldb.com/?ctiid.339332

Permissions RequiredVDB Entry

https://vuldb.com/?id.339332

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.719825

Third Party AdvisoryVDB Entry

Weaknesses



CWE-119

CVSS impact metrics


CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

5.3 · Medium

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2026-01-01T20:15:40.640Z

2 weeks ago

Last modified

2026-01-06T15:52:38.087Z

1 week ago